Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe
-
Size
372KB
-
MD5
ba8ba3c729d8e921e332bac9f829a0fa
-
SHA1
d9f0a8ce1f4960db5d3f2e524c8cb178128b5289
-
SHA256
1b7dea6d3b542f8aed215499c4130e5a0d1313a9fa74b284290dbfdfb1434c62
-
SHA512
aee8440d6e19b823871a18c00cca9a87edc86088dfe28f9164eb9b26713573b8353960516f284d6cf0c0eceff11ef30991c59a24cbcd66c9f1eb6199289436cb
-
SSDEEP
3072:CEGh0ovlMOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBfM:CEGNlkOe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Auto-generated rule 12 IoCs
resource yara_rule behavioral1/files/0x000b00000001226e-5.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000e0000000126a6-12.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0004000000004ed7-19.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000300000000b1f7-26.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0005000000004ed7-33.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000400000000b1f7-40.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0006000000004ed7-47.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000500000000b1f7-54.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0007000000004ed7-61.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000600000000b1f7-68.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x0008000000004ed7-75.dat GoldenEyeRansomware_Dropper_MalformedZoomit behavioral1/files/0x000700000000b1f7-82.dat GoldenEyeRansomware_Dropper_MalformedZoomit -
Modifies Installed Components in the registry 2 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B} {DE82F364-C08A-4105-ACFB-D419633D9447}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B}\stubpath = "C:\\Windows\\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe" {DE82F364-C08A-4105-ACFB-D419633D9447}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C} {DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D48C093-2609-4af8-ADDD-B97596301918}\stubpath = "C:\\Windows\\{5D48C093-2609-4af8-ADDD-B97596301918}.exe" {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39A9442E-06C6-4ab4-933B-67149A473D8E} {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DE240A7-646D-4ceb-BA7C-43EF463C5247}\stubpath = "C:\\Windows\\{2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe" {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC39358B-D14F-44d3-97A9-010ECF47FF33}\stubpath = "C:\\Windows\\{DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe" {6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}\stubpath = "C:\\Windows\\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}.exe" {DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39A9442E-06C6-4ab4-933B-67149A473D8E}\stubpath = "C:\\Windows\\{39A9442E-06C6-4ab4-933B-67149A473D8E}.exe" {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B} {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE82F364-C08A-4105-ACFB-D419633D9447} {2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7} {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}\stubpath = "C:\\Windows\\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe" {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF} {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}\stubpath = "C:\\Windows\\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe" {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DE240A7-646D-4ceb-BA7C-43EF463C5247} {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34E3EB27-79B9-49a8-8292-E6F18516B910}\stubpath = "C:\\Windows\\{34E3EB27-79B9-49a8-8292-E6F18516B910}.exe" 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D48C093-2609-4af8-ADDD-B97596301918} {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57} {5D48C093-2609-4af8-ADDD-B97596301918}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC39358B-D14F-44d3-97A9-010ECF47FF33} {6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DE82F364-C08A-4105-ACFB-D419633D9447}\stubpath = "C:\\Windows\\{DE82F364-C08A-4105-ACFB-D419633D9447}.exe" {2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34E3EB27-79B9-49a8-8292-E6F18516B910} 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}\stubpath = "C:\\Windows\\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe" {5D48C093-2609-4af8-ADDD-B97596301918}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}\stubpath = "C:\\Windows\\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe" {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe -
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 2804 {2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe 1612 {DE82F364-C08A-4105-ACFB-D419633D9447}.exe 1792 {6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe 2424 {DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe 2992 {B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\{5D48C093-2609-4af8-ADDD-B97596301918}.exe {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe File created C:\Windows\{39A9442E-06C6-4ab4-933B-67149A473D8E}.exe {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe File created C:\Windows\{DE82F364-C08A-4105-ACFB-D419633D9447}.exe {2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe File created C:\Windows\{DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe {6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe File created C:\Windows\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}.exe {DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe File created C:\Windows\{34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe File created C:\Windows\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe {5D48C093-2609-4af8-ADDD-B97596301918}.exe File created C:\Windows\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe File created C:\Windows\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe File created C:\Windows\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe File created C:\Windows\{2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe File created C:\Windows\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe {DE82F364-C08A-4105-ACFB-D419633D9447}.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe Token: SeIncBasePriorityPrivilege 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe Token: SeIncBasePriorityPrivilege 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe Token: SeIncBasePriorityPrivilege 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe Token: SeIncBasePriorityPrivilege 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe Token: SeIncBasePriorityPrivilege 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe Token: SeIncBasePriorityPrivilege 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe Token: SeIncBasePriorityPrivilege 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe Token: SeIncBasePriorityPrivilege 2804 {2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe Token: SeIncBasePriorityPrivilege 1612 {DE82F364-C08A-4105-ACFB-D419633D9447}.exe Token: SeIncBasePriorityPrivilege 1792 {6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe Token: SeIncBasePriorityPrivilege 2424 {DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2016 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 28 PID 2240 wrote to memory of 2016 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 28 PID 2240 wrote to memory of 2016 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 28 PID 2240 wrote to memory of 2016 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 28 PID 2240 wrote to memory of 2896 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 29 PID 2240 wrote to memory of 2896 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 29 PID 2240 wrote to memory of 2896 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 29 PID 2240 wrote to memory of 2896 2240 2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe 29 PID 2016 wrote to memory of 2204 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 32 PID 2016 wrote to memory of 2204 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 32 PID 2016 wrote to memory of 2204 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 32 PID 2016 wrote to memory of 2204 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 32 PID 2016 wrote to memory of 2868 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 33 PID 2016 wrote to memory of 2868 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 33 PID 2016 wrote to memory of 2868 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 33 PID 2016 wrote to memory of 2868 2016 {34E3EB27-79B9-49a8-8292-E6F18516B910}.exe 33 PID 2204 wrote to memory of 3056 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 34 PID 2204 wrote to memory of 3056 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 34 PID 2204 wrote to memory of 3056 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 34 PID 2204 wrote to memory of 3056 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 34 PID 2204 wrote to memory of 2892 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 35 PID 2204 wrote to memory of 2892 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 35 PID 2204 wrote to memory of 2892 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 35 PID 2204 wrote to memory of 2892 2204 {5D48C093-2609-4af8-ADDD-B97596301918}.exe 35 PID 3056 wrote to memory of 2872 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 36 PID 3056 wrote to memory of 2872 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 36 PID 3056 wrote to memory of 2872 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 36 PID 3056 wrote to memory of 2872 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 36 PID 3056 wrote to memory of 2760 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 37 PID 3056 wrote to memory of 2760 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 37 PID 3056 wrote to memory of 2760 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 37 PID 3056 wrote to memory of 2760 3056 {7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe 37 PID 2872 wrote to memory of 700 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 38 PID 2872 wrote to memory of 700 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 38 PID 2872 wrote to memory of 700 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 38 PID 2872 wrote to memory of 700 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 38 PID 2872 wrote to memory of 2436 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 39 PID 2872 wrote to memory of 2436 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 39 PID 2872 wrote to memory of 2436 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 39 PID 2872 wrote to memory of 2436 2872 {78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe 39 PID 700 wrote to memory of 1960 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 40 PID 700 wrote to memory of 1960 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 40 PID 700 wrote to memory of 1960 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 40 PID 700 wrote to memory of 1960 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 40 PID 700 wrote to memory of 1980 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 41 PID 700 wrote to memory of 1980 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 41 PID 700 wrote to memory of 1980 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 41 PID 700 wrote to memory of 1980 700 {39A9442E-06C6-4ab4-933B-67149A473D8E}.exe 41 PID 1960 wrote to memory of 1092 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 42 PID 1960 wrote to memory of 1092 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 42 PID 1960 wrote to memory of 1092 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 42 PID 1960 wrote to memory of 1092 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 42 PID 1960 wrote to memory of 112 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 43 PID 1960 wrote to memory of 112 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 43 PID 1960 wrote to memory of 112 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 43 PID 1960 wrote to memory of 112 1960 {620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe 43 PID 1092 wrote to memory of 2804 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 44 PID 1092 wrote to memory of 2804 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 44 PID 1092 wrote to memory of 2804 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 44 PID 1092 wrote to memory of 2804 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 44 PID 1092 wrote to memory of 2044 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 45 PID 1092 wrote to memory of 2044 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 45 PID 1092 wrote to memory of 2044 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 45 PID 1092 wrote to memory of 2044 1092 {EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-18_ba8ba3c729d8e921e332bac9f829a0fa_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\{34E3EB27-79B9-49a8-8292-E6F18516B910}.exeC:\Windows\{34E3EB27-79B9-49a8-8292-E6F18516B910}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\{5D48C093-2609-4af8-ADDD-B97596301918}.exeC:\Windows\{5D48C093-2609-4af8-ADDD-B97596301918}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exeC:\Windows\{7D5EE1EA-DDF5-4aa7-BDDB-2DE66DCC9B57}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exeC:\Windows\{78CDA7EF-0D6D-4dd4-94B5-C2EF0F8AF6B7}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\{39A9442E-06C6-4ab4-933B-67149A473D8E}.exeC:\Windows\{39A9442E-06C6-4ab4-933B-67149A473D8E}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exeC:\Windows\{620613FF-9A6F-4ab4-A4F3-5F9945DB7B0B}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exeC:\Windows\{EE971E89-D9D2-4caa-B4F2-9C935B5A35CF}.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\{2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exeC:\Windows\{2DE240A7-646D-4ceb-BA7C-43EF463C5247}.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\{DE82F364-C08A-4105-ACFB-D419633D9447}.exeC:\Windows\{DE82F364-C08A-4105-ACFB-D419633D9447}.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exeC:\Windows\{6698A3E6-711C-44fb-BCF2-83129E8FFF9B}.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\{DC39358B-D14F-44d3-97A9-010ECF47FF33}.exeC:\Windows\{DC39358B-D14F-44d3-97A9-010ECF47FF33}.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Windows\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}.exeC:\Windows\{B65F18C0-5FE9-47c5-AACD-6D7639D9D54C}.exe13⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DC393~1.EXE > nul13⤵PID:400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6698A~1.EXE > nul12⤵PID:912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DE82F~1.EXE > nul11⤵PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2DE24~1.EXE > nul10⤵PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EE971~1.EXE > nul9⤵PID:2044
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{62061~1.EXE > nul8⤵PID:112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{39A94~1.EXE > nul7⤵PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{78CDA~1.EXE > nul6⤵PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7D5EE~1.EXE > nul5⤵PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5D48C~1.EXE > nul4⤵PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34E3E~1.EXE > nul3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵
- Deletes itself
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5cbeab6353a1787143849d50b0d882e6c
SHA1b3760a8e8073ee1e670bb86d239e9bf98cc335f2
SHA256de928b67bd7946f75293e34b802a7ff2a2b9ab2f47f56aeb3bbac37bb275434d
SHA51225cc9b9d354428aa48cb353c70d6c77d519452d8e031e3ef78d313f47ef1bc41626993d4393cc7426c4e949d935911c39564e7d087188869d89fb649569ed25f
-
Filesize
372KB
MD580a952090692cd8b6fd2587b7bc7b216
SHA1e2fe0c4c4d1c2dd08a5f2c49aec7de36b6cb7e2b
SHA256c57d19e1d35c3323dae5559ae1dfe35736a1ef89acf38d139c8b018bb7afa158
SHA512321adcb06a5c5e71722cd216f76bd2c3bac81a48dffd1d1539ed3c29f701cf1db81e9286240fe05ebf86d0e7cb1e70951552abf89ca021e3370076c41a11fe84
-
Filesize
372KB
MD5a8f7c1891502626a2ece57b8d53f83ee
SHA17bd60052650b8038af6bdf3876294c6889808bb0
SHA256854ad2b331b94a3ad7b4ce410fb57f9baa408e3e98950ded593e1263a0a1b462
SHA512c1ebf48a9f37fc1645193439fb88c82958b43fe7f4cf5f4e0c144de568376ab423210a787f6be93462b443c49c510ad938e880d5e8715a175bfdee0a85f4a803
-
Filesize
372KB
MD5e8a667b0428bf6bfa6f4d364ca800351
SHA1ca463426788d9709d3c3b2cf032ef28cdd744236
SHA256c04f36c2c852930bb51bb4790f87c1977866c143c8920b53402474f6e0acf2b2
SHA512e449bcf69050f12f733015dd938bc707ce3ea82ff27324299b451a9baa6bc22971c9eae029ecc323a00186a54a5462a110f105d8370ea50b8e0f60e74caa36f4
-
Filesize
372KB
MD5de141bf2abe6bc04336233651c554557
SHA1838f53a2f930ca0e85d15dd1e8cc6b17f37dbdd1
SHA25610f37079311d930e8b9417a0065795b5081be7def16dcd27528da7ef99440f38
SHA512ddadbc9dff3f135cec16cbf00bab17c4737f6b94dbfbe0f91948ab661107da6319af2ef3ea36427fb0f5a62246ff5cdbc46b05d650916adcf0a1ae798efc11f4
-
Filesize
372KB
MD5125367795330c2db5cc75c60abc5a518
SHA109f1c06b580441f5a3cc808b925643745f7c1406
SHA2567d6402df66c1b175bf51e305138be163c2957c4ca7ec4e23e9934506ec7c719f
SHA5121597ca624161a1dfebcac57abdcc710c2200a043b2529e4fce1e728b86bdc711e208a20902f99fd25a0ae0488019776a6790cd45778e47a7ebf09058b227c9bd
-
Filesize
372KB
MD5fcc044172e6cff1370a3018f7ce85286
SHA1a8a681644577d0e35e92b361100f47909f91a200
SHA25640da54346c6129607d62b6d48a9279e842c54e66ff7b6953cb9d378d3ca42d30
SHA512e221c479eebd24126d2f810def4a02fe0264f3fbfe364ce8c705194595ca9571b8bade47e2bfbbd41f7f9b3b9182ec9090644c1148eedb3ffda38a8021c0ef20
-
Filesize
372KB
MD58fcba6bdc12f542480b9f4b260e006a3
SHA19c712b62f6c3bd919df33ab8c00ef757afcff271
SHA256aaada3d41f559f1da6caf67a39600d868e10cd883ee93cdbf00af8cc19045319
SHA512d8115be8406a07aef2b572e892eddf19b6f70d0daf8e70bf5d61bfc2e2f38751f30296ffe3f8f2d9f4f6b27db96cfd138b607bac203be2b348f746c7d386c97c
-
Filesize
372KB
MD55e18d1aa4e78ca0b3e3c4a4c1db01bf6
SHA18204cc0e8604208327e1475c1b5e45c65b867d40
SHA256547b8defbacd0cc99115bd79741a30c87f2898e7053cc98eac38fab8cb5feb24
SHA5121abaf810967a5b5e6780bc766253a5d3bb22cf31a8e177f3ed7d62b9103cd85318aca9bb37273fa78f5592085e99b15a4cd08a215d12949296f5123c3f10ddb9
-
Filesize
372KB
MD53550cd8ad1d377f43b8c6143c0a13155
SHA1964ac39362dcd7d569914655720ece4f4b516a8a
SHA256fcaec7be1e9fc7711f86f201dc089f9b6579955d9facec38b0fedeb8da9d340b
SHA512d1303a83779c1e8d6fc698f7cb1d0fb9a11f786c7c33000d6a57a5333bfd5e99805decc6f9004e230bb8dfdf09c6b4e863fd147738ed455a823441f240e45c18
-
Filesize
372KB
MD5a58b1fcab8cc3a8e1c111ca5255af454
SHA186d7d1c30d03ab7f117ad022c4b5835416cfa967
SHA2564cce5b7c843da8728b0ef7cc401f151d40e585ccfd92588cc3f68fe568d01ce6
SHA512955cd84d0b42f784ffbbff9725bd5d7a9046ef7eb2475f68ce58b2f477e4865e28bb081495da4842a3c8d31de31f548cda5834f7e54b846edfba29ca15fed32e
-
Filesize
372KB
MD5f001f721400d807c377adebb4ca385d0
SHA13fadb35f1cc8108f1ee1ee58098b43bb99988823
SHA256827cc1588af03637a8e300812e4693f4f3c1d4e4d72ffd6d6149aa1eb5d826de
SHA5122054fae05c63f6115fdd2c010bcea58fd2b48fa559b50c545cf7d2ecf7366041de0780c6a141ae33a3579d8b0fbf8a887b8eba3fa65cce53d3f393ac10aefd34